Optimization of cyber security through the implementation of AI technologies
Identification of cyber threats is crucial and significant for determining substantial security techniques and approaches. This research illustrates a brief discussion of cyberspace challenges and threats in a disruptive era alongside comprehensive approaches in mitigating the risk of cyber threats....
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
De Gruyter
2025-02-01
|
Series: | Journal of Intelligent Systems |
Subjects: | |
Online Access: | https://doi.org/10.1515/jisys-2024-0226 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1823860497812815872 |
---|---|
author | Nawaf Liqaa Bentotahewa Vibhushinie |
author_facet | Nawaf Liqaa Bentotahewa Vibhushinie |
author_sort | Nawaf Liqaa |
collection | DOAJ |
description | Identification of cyber threats is crucial and significant for determining substantial security techniques and approaches. This research illustrates a brief discussion of cyberspace challenges and threats in a disruptive era alongside comprehensive approaches in mitigating the risk of cyber threats. Additionally, the aim of this research is to provide beneficial approaches on how to handle cyber threats in detail. For example, threats and attacks may be caused in the absence of legislation, ethical standardization, support system, and lack of access control. The governance system, therefore, will put a lot of effort into communicating, identifying, and enforcing the principles of security to moderate risk. The Metaheuristic algorithms are stimulated by the human brain, so implementing Artificial Intelligence (AI) that assists the Neural Network to mimic the behaviour of the human brain is important to predict significant outcomes. In this study, the author investigates and analyses the rapid growth of cyber threats to outline the solutions. The aim of this study is to contribute to cyber security optimization through implementing AI methodologies. |
format | Article |
id | doaj-art-626a7fc19a6e4ebfad2f8c02cb77b4ac |
institution | Kabale University |
issn | 2191-026X |
language | English |
publishDate | 2025-02-01 |
publisher | De Gruyter |
record_format | Article |
series | Journal of Intelligent Systems |
spelling | doaj-art-626a7fc19a6e4ebfad2f8c02cb77b4ac2025-02-10T13:24:26ZengDe GruyterJournal of Intelligent Systems2191-026X2025-02-013411310210.1515/jisys-2024-0226Optimization of cyber security through the implementation of AI technologiesNawaf Liqaa0Bentotahewa Vibhushinie1Cybersecurity, Information Networks Centre (CINC), Cardiff School of Technologies, Llandaff Campus, Cardiff Metropolitan University, Western Avenue, Cardiff, CF5 2YB, United KingdomCybersecurity, Information Networks Centre (CINC), Cardiff School of Technologies, Llandaff Campus, Cardiff Metropolitan University, Western Avenue, Cardiff, CF5 2YB, United KingdomIdentification of cyber threats is crucial and significant for determining substantial security techniques and approaches. This research illustrates a brief discussion of cyberspace challenges and threats in a disruptive era alongside comprehensive approaches in mitigating the risk of cyber threats. Additionally, the aim of this research is to provide beneficial approaches on how to handle cyber threats in detail. For example, threats and attacks may be caused in the absence of legislation, ethical standardization, support system, and lack of access control. The governance system, therefore, will put a lot of effort into communicating, identifying, and enforcing the principles of security to moderate risk. The Metaheuristic algorithms are stimulated by the human brain, so implementing Artificial Intelligence (AI) that assists the Neural Network to mimic the behaviour of the human brain is important to predict significant outcomes. In this study, the author investigates and analyses the rapid growth of cyber threats to outline the solutions. The aim of this study is to contribute to cyber security optimization through implementing AI methodologies.https://doi.org/10.1515/jisys-2024-0226optimizationcyberspacecyber threataiiotsecurityprivacygdprcovid-19 |
spellingShingle | Nawaf Liqaa Bentotahewa Vibhushinie Optimization of cyber security through the implementation of AI technologies Journal of Intelligent Systems optimization cyberspace cyber threat ai iot security privacy gdpr covid-19 |
title | Optimization of cyber security through the implementation of AI technologies |
title_full | Optimization of cyber security through the implementation of AI technologies |
title_fullStr | Optimization of cyber security through the implementation of AI technologies |
title_full_unstemmed | Optimization of cyber security through the implementation of AI technologies |
title_short | Optimization of cyber security through the implementation of AI technologies |
title_sort | optimization of cyber security through the implementation of ai technologies |
topic | optimization cyberspace cyber threat ai iot security privacy gdpr covid-19 |
url | https://doi.org/10.1515/jisys-2024-0226 |
work_keys_str_mv | AT nawafliqaa optimizationofcybersecuritythroughtheimplementationofaitechnologies AT bentotahewavibhushinie optimizationofcybersecuritythroughtheimplementationofaitechnologies |